Search alternatives:
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cheeks » checks (Expand Search), cheers (Expand Search), cheek (Expand Search), chenks (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), checked (Expand Search)
chuen » chen (Expand Search), chun (Expand Search), chuan (Expand Search)
chee » chen (Expand Search)
ceers » cheers (Expand Search), peers (Expand Search), cers (Expand Search)
beers » peers (Expand Search), bears (Expand Search), beer (Expand Search)
sheer » shear (Expand Search), sheet (Expand Search), steer (Expand Search)
cheeks » checks (Expand Search), cheers (Expand Search), cheek (Expand Search), chenks (Expand Search)
checkers » checker (Expand Search), checks (Expand Search), checked (Expand Search)
chuen » chen (Expand Search), chun (Expand Search), chuan (Expand Search)
chee » chen (Expand Search)
-
561
-
562
A study of the roles of colour and shape in the perception of perfume
Published 2015Get full text
Final Year Project (FYP) -
563
Locating surface cracks and static objects on 2D structures using NDT scanning techniques
Published 2017Get full text
Final Year Project (FYP) -
564
A systematic review : motivational factors influencing volunteer participation in sporting events
Published 2018Get full text
Final Year Project (FYP) -
565
Use of hardening soil model for excavation in residual soil
Published 2018Get full text
Final Year Project (FYP) -
566
Predicting the antigenicity and reassortment probability of influenza viruses
Published 2019Get full text
Final Year Project (FYP) -
567
Physical unclonable function based solutions to unification of user, device and data authentication
Published 2020“…The non-repudiation assumption of these conventional techniques is being challenged by emerging artificial-intelligent assisted and malware-based attacks on independently chained weak links (factors), and their limited extension to IoT scenarios, where the sheer number of inexpensive and often insufficiently protected endpoints prevent application of standard, secret-key based techniques. …”
Get full text
Thesis-Doctor of Philosophy -
568
Educational website with cyber offense and defense demonstration
Published 2022Get full text
Final Year Project (FYP) -
569
Study on supply chain challenges in container shipping : the carrier’s perspective
Published 2009Get full text
Final Year Project (FYP) -
570
Enhancing rework techniques in microelectronics components for reusability
Published 2024Get full text
Final Year Project (FYP) -
571
Improving microstructural homogeneity of flash sintered SiC ceramics
Published 2024Get full text
Final Year Project (FYP) -
572
-
573
Self assembled monolayers (SAMs) passivation at TiO2/electrolyte interface in dye sensitized solar cell (DSSC)
Published 2010Get full text
Final Year Project (FYP) -
574
Bunker risk management strategies in liner shipping companies part I : operational measures to reduce bunker risk
Published 2012Get full text
Final Year Project (FYP) -
575
-
576
Studying properties of SLM fabricated parts and relating properties of SLM parts to heat treated metals
Published 2012Get full text
Final Year Project (FYP) -
577
Building up a web-based e-lifestyle application
Published 2013Get full text
Final Year Project (FYP) -
578
Structural modeling of LAG-3 protein and immunoglobulin domains
Published 2014Get full text
Final Year Project (FYP) -
579
Synthesis of borate-based epoxy molding compound for radiation hardened electronics packaging
Published 2014Get full text
Final Year Project (FYP) -
580